APPLIED/cmnt: [Eoan 0/5] CVE-2019-3016

Kleber Souza kleber.souza at canonical.com
Fri Feb 14 15:13:53 UTC 2020


On 31.01.20 12:06, Thadeu Lima de Souza Cascardo wrote:
> This has been built on all platforms and smoke tested as a host on x86 and
> ppc64el.
> 
> Boris Ostrovsky (5):
>   UBUNTU: SAUCE: x86/kvm: Be careful not to clear KVM_VCPU_FLUSH_TLB bit
>   UBUNTU: SAUCE: x86/kvm: Introduce kvm_(un)map_gfn()
>   UBUNTU: SAUCE: x86/kvm: Cache gfn to pfn translation
>   UBUNTU: SAUCE: x86/KVM: Make sure KVM_VCPU_FLUSH_TLB flag is not
>     missed
>   UBUNTU: SAUCE: x86/KVM: Clean up host's steal time structure
> 
>  arch/x86/include/asm/kvm_host.h |   4 +-
>  arch/x86/kvm/x86.c              |  67 ++++++++++++-------
>  include/linux/kvm_host.h        |   5 ++
>  include/linux/kvm_types.h       |   9 ++-
>  virt/kvm/kvm_main.c             | 113 +++++++++++++++++++++++++++-----
>  5 files changed, 153 insertions(+), 45 deletions(-)
> 

Applied to eoan/linux, cherry-picking/backporting the patches from
mainline as noted by Stefan.

Thanks,
Kleber



More information about the kernel-team mailing list